{"id":32253,"date":"2019-12-11T16:44:06","date_gmt":"2019-12-11T16:44:06","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30757\/Microsoft-Fixes-Exploited-Privilege-Escalation-Flaw-34-More-Bugs.html"},"modified":"2019-12-11T16:44:06","modified_gmt":"2019-12-11T16:44:06","slug":"microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/","title":{"rendered":"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2018\/08\/microsoftlogowall_1220186.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"wysiwyg\">\n<p>For its final Patch Tuesday release of the year, Microsoft Corporation issued a series of security updates that fixed a total of 35 vulnerabilities, seven of which were deemed critical and one of which was found to be actively exploited.<\/p>\n<p>The most severe flaws consist of remote code execution vulnerabilities in Git for Visual Studio (five: <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1349\">CVE-2019-1349<\/a>, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1350\">CVE-2019-1350<\/a>, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1352\">CVE-2019-1352<\/a>, <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1354\">CVE-2019-1354<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1387\">CVE-2019-1387<\/a>), Win32k Graphics (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1468\">CVE-2019-1468<\/a>) and Windows Hyper-V (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1471\">CVE-2019-1471<\/a>).<\/p>\n<p>The five RCE flaws in Visual Studio are all caused by improper sanitization. \u201cAn attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights,\u201d Microsoft warns in its various advisory pages for the bugs. \u201cTo exploit the vulnerability, an attacker would first need to convince the user to clone a malicious repo.\u201d<\/p>\n<p>Microsoft explains that it has fixed the problems by \u201ccorrecting how Git for Visual Studio validates command-line input.\u201d<\/p>\n<p>Notable among the remaining vulnerabilities is <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1458\">CVE-2019-1458<\/a>, a privilege escalation flaw found in the Win32k driver. Although it was not assessed as critical, researchers from Kaspersky determined that malicious actors have been actively exploiting the bug as a zero-day to elevate privileges on infected machines and also to escape the Google Chrome browser\u2019s sandbox protections.<\/p>\n<p>In a <a href=\"https:\/\/usa.kaspersky.com\/about\/press-releases\/2019_kaspersky-finds-zero-day-exploit-in-windows-os\">press release<\/a> Tuesday, Russian cyber firm <a href=\"https:\/\/www.scmagazine.com\/?s=Kaspersky\">Kaspersky<\/a> reveals that these actors are the ones behind Operation <a href=\"https:\/\/www.scmagazine.com\/?s=Wizard+Opium\">WizardOpium<\/a> \u2013 a mysterious malware campaign that the security company described in a <a href=\"https:\/\/securelist.com\/chrome-0-day-exploit-cve-2019-13720-used-in-operation-wizardopium\/94866\/\">blog post<\/a> last November. In that earlier report, Kaspersky noted that these actors had been exploiting a zero-day code execution bug in Chrome that Google patched on Oct. 31.<\/p>\n<p>Kaspersky now says that the newly discovered exploit was found embedded in the older Chrome exploit.<\/p>\n<p>\u201cThis type of attack requires vast resources. However, it gives significant advantages to the attackers and, as we can see, they are happy to exploit it,\u201d said Anton Ivanov, security expert at Kaspersky, in the release. \u201cThe number of zero days in the wild continues to grow and this trend is unlikely to go away. Organizations need to rely on the latest threat intelligence available at hand and have protective technologies that can proactively find unknown threats such as zero-day exploits.\u201d<\/p>\n<p>Although Microsoft fixed 35 vulnerabilities, there was actually a 36th bug that the company did not bother to fix: <a rel=\"noreferrer noopener\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1489\" target=\"_blank\">CVE-2019-1489<\/a>, an information disclosure vulnerability in Remote Desktop Protocol for Microsoft Windows XP Service Pack 3. Because Windows XP is out of support, Microsoft has elected not to address the vulnerability.<\/p>\n<\/div>\n<section class=\"post-tags\">\n<h2>Topics:<\/h2>\n<p><a href=\"https:\/\/www.scmagazine.com\/tag\/network-security\/\" class=\"button -secondary\">Network Security<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/patch\/\" class=\"button -secondary\">Patch<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/vulnerability\/\" class=\"button -secondary\">Vulnerability<\/a> <a href=\"https:\/\/www.scmagazine.com\/tag\/zero-day\/\" class=\"button -secondary\">Zero Day<\/a><\/section>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30757\/Microsoft-Fixes-Exploited-Privilege-Escalation-Flaw-34-More-Bugs.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32254,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5301],"class_list":["post-32253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemicrosoftflawpatch"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-11T16:44:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"379\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs\",\"datePublished\":\"2019-12-11T16:44:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/\"},\"wordCount\":448,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg\",\"keywords\":[\"headline,microsoft,flaw,patch\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/\",\"name\":\"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg\",\"datePublished\":\"2019-12-11T16:44:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg\",\"width\":700,\"height\":379},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,microsoft,flaw,patch\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftflawpatch\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-12-11T16:44:06+00:00","og_image":[{"width":700,"height":379,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs","datePublished":"2019-12-11T16:44:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/"},"wordCount":448,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg","keywords":["headline,microsoft,flaw,patch"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/","name":"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg","datePublished":"2019-12-11T16:44:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/12\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs.jpg","width":700,"height":379},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-exploited-privilege-escalation-flaw-34-more-bugs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,microsoft,flaw,patch","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftflawpatch\/"},{"@type":"ListItem","position":3,"name":"Microsoft Fixes Exploited Privilege Escalation Flaw, 34 More Bugs"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32253"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32253\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32254"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}