{"id":32977,"date":"2020-01-23T07:04:08","date_gmt":"2020-01-23T07:04:08","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/"},"modified":"2020-01-23T07:04:08","modified_gmt":"2020-01-23T07:04:08","slug":"still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/","title":{"rendered":"Still losing sleep over that awful Citrix bug? This scanner is here to help&#8230; you realize you&#8217;ve already been pwned"},"content":{"rendered":"<p>Citrix and FireEye have released a new security tool to help admins find out if their servers have been hacked via the high-profile CVE-2019-19781 flaw that was disclosed in December but only patched on Monday.<\/p>\n<p>The <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/github.com\/citrix\/ioc-scanner-CVE-2019-19781\/\">free application<\/a>, shared under the Apache 2.0 open-source license, will scan devices for indications of compromise for the so-called &#8220;Shitrix&#8221; <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/12\/23\/patch_now_published_citrix_applications_leave_network_vulnerable_to_unauthorised_access\/\" rel=\"noopener noreferrer\">arbitrary code execution vulnerability<\/a> in Citrix&#8217;s Application Delivery Controller and Gateway products. The tool can be run on any Citrix instance to check for signs of an intrusion.<\/p>\n<p>Using some of the samples collected from attacks in the wild, including the recently unearthed <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2020\/01\/17\/hackers_patch_citrix_vulnerability\/\" rel=\"noopener noreferrer\">Notrobin<\/a>&#8216; malware, the scanner&#8217;s makers were able to piece together their app.<\/p>\n<p>&#8220;The tool combines Citrix\u2019s technical knowledge of the Citrix ADC and Gateway products and CVE-2019-19781 with industry-leading FireEye Mandiant\u2019s forensics expertise and current knowledge of recent CVE-2019-19781 related compromises,&#8221; Citrix said.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/07\/23\/band_aid_648.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"band_aid_648\"><\/p>\n<h2 title=\"SD-WAN WANOP will have to wait a few days, though\">As miscreants prey on thousands of vulnerable boxes, Citrix finally emits patches to fill in hijacking holes in Gateway and ADC<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2020\/01\/20\/citrix_patches_vulns_gateway_adc\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The tool, Citrix warned, will only detect specific indicators of compromise, tell-tale signs that a miscreant has exploited the bug to get access to machines. It is not intended as a vulnerability scanner and is not guaranteed to spot any attack against other flaws.<\/p>\n<p>&#8220;Remember, the tool will not make an assertion that a system has not been compromised. The tool will only state when IoCs [Indicators of Compromise] are identified,&#8221; <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.fireeye.com\/blog\/products-and-services\/2020\/01\/fireeye-and-citrix-tool-scans-for-iocs-related-to-vulnerability.html\">FireEye warned<\/a>.<\/p>\n<p>&#8220;It will also not provide formal malware family names of all malicious tools and scripts identified on compromised systems, nor will it identify the existence of all malware or evidence of compromise on the system.&#8221;<\/p>\n<p>Still, the free scanner will at least allow admins to get a general idea of the state of their Citrix gear. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1889\/-8120\/detecting-cyber-attacks-as-a-small-to-medium-business?td=wptl1889\">Detecting cyber attacks as a small to medium business<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/01\/23\/citrix_attack_detector\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Handy FireEye tool roots out indicators of compromise Citrix and FireEye have released a new security tool to help admins find out if their servers have been hacked via the high-profile CVE-2019-19781 flaw that was disclosed in December but only patched on Monday.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32978,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-32977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Still losing sleep over that awful Citrix bug? This scanner is here to help... you realize you&#039;ve already been pwned 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Still losing sleep over that awful Citrix bug? This scanner is here to help... you realize you&#039;ve already been pwned 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-23T07:04:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Still losing sleep over that awful Citrix bug? This scanner is here to help&#8230; you realize you&#8217;ve already been pwned\",\"datePublished\":\"2020-01-23T07:04:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/\"},\"wordCount\":334,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/\",\"name\":\"Still losing sleep over that awful Citrix bug? This scanner is here to help... you realize you've already been pwned 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg\",\"datePublished\":\"2020-01-23T07:04:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Still losing sleep over that awful Citrix bug? This scanner is here to help&#8230; you realize you&#8217;ve already been pwned\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Still losing sleep over that awful Citrix bug? This scanner is here to help... you realize you've already been pwned 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/","og_locale":"en_US","og_type":"article","og_title":"Still losing sleep over that awful Citrix bug? This scanner is here to help... you realize you've already been pwned 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-23T07:04:08+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Still losing sleep over that awful Citrix bug? This scanner is here to help&#8230; you realize you&#8217;ve already been pwned","datePublished":"2020-01-23T07:04:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/"},"wordCount":334,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/","url":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/","name":"Still losing sleep over that awful Citrix bug? This scanner is here to help... you realize you've already been pwned 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg","datePublished":"2020-01-23T07:04:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/still-losing-sleep-over-that-awful-citrix-bug-this-scanner-is-here-to-help-you-realize-youve-already-been-pwned\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Still losing sleep over that awful Citrix bug? This scanner is here to help&#8230; you realize you&#8217;ve already been pwned"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32977"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32978"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}