{"id":34060,"date":"2020-03-26T07:00:11","date_gmt":"2020-03-26T07:00:11","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/"},"modified":"2020-03-26T07:00:11","modified_gmt":"2020-03-26T07:00:11","slug":"sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/","title":{"rendered":"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/03\/17\/shutterstock_coronavirus_map.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"reg_sticker secondary\">Promo<\/span> Amid this planet&#8217;s ongoing pandemic and stay-at-home measures, if you\u2019re keen to repurpose all that time previously spent commuting, attending conferences, and so on, why not take a look at the SANS Institute\u2019s <a target=\"_blank\" href=\"https:\/\/go.theregister.co.uk\/k\/45_SANS_Courses_Available_Online\" rel=\"noopener noreferrer\">Online Cybersecurity Training<\/a>.<\/p>\n<p>SANS has been researching and educating the cybersecurity industry since 1989, building its fully GIAC-certified training courses around in-person events held worldwide. Over the past 15 years, a whopping 40 courses have been made available online, featuring top-class instructors from across the industry. This archive amounts to several months of tuition and materials, and is quite simply the highest quality insight and information of its kind available anywhere in the world today.<\/p>\n<p>With subjects ranging from deep dives into cloud security architecture to wireless penetration testing, and even slightly wilder areas, such as good cybersecurity writing, these <a target=\"_blank\" href=\"https:\/\/go.theregister.co.uk\/k\/45_SANS_Courses_Available_Online\" rel=\"noopener noreferrer\">online courses<\/a> are an an ocean of high-quality education \u2013 and they tend to work out cheaper than travelling to in-person, multi-day sessions.<\/p>\n<h3 class=\"crosshead\"><span>Free remote workforce essentials kit<\/span><\/h3>\n<p>As social distancing bumps online training into the foreground, together with remote working for many organisations, SANS Security Awareness has created a <a target=\"_blank\" href=\"https:\/\/go.theregister.co.uk\/k\/SANS_WFH_toolkit\" rel=\"noopener noreferrer\">Work From Home<\/a> Deployment Kit designed to ensure that life goes on as normal and safely. The kit contains everything you need to quickly train and secure your remote workforce with essential resources and training materials. This is a combination of public resources and paid training materials, which SANS is releasing for <a target=\"_blank\" href=\"https:\/\/go.theregister.co.uk\/k\/SANS_WFH_toolkit\" rel=\"noopener noreferrer\">free<\/a>.<\/p>\n<p>SANS Online Cybersecurity Training is recommended by 94 per cent of its students, and every single one of Fortune\u2019s Top 30 companies have used it on some level.<\/p>\n<p>Anyway, don\u2019t just take our word for it. Founder of Counter Hack Ed Skoudis, and SANS curriculum lead Rob Lee, have put together a webcast to tell you themselves. Filling you in on the pathways and topics followed online by tens of thousands of students over the past decade and a half, the Understanding SANS CyberCast will show you how learning online with SANS is <a target=\"_blank\" href=\"https:\/\/go.theregister.co.uk\/k\/SANS_train_without_travel\" rel=\"noopener noreferrer\">So Much More Than Live Virtual Training<\/a>.<\/p>\n<p>Sign up and watch the SANS CyberCast <a target=\"_blank\" href=\"https:\/\/go.theregister.co.uk\/k\/SANS_train_without_travel\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1915\/-8374\/unlock-the-value-of-sd-wan?td=wptl1915\">Webcast: Why you need managed detection and response<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/03\/26\/sans_certified_cybersecurity_training\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Isolation is the perfect time to learn new skills Promo\u00a0 Amid this planet&#8217;s ongoing pandemic and stay-at-home measures, if you\u2019re keen to repurpose all that time previously spent commuting, attending conferences, and so on, why not take a look at the SANS Institute\u2019s Online Cybersecurity Training.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34061,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-34060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T07:00:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1302\" \/>\n\t<meta property=\"og:image:height\" content=\"651\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker\",\"datePublished\":\"2020-03-26T07:00:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/\"},\"wordCount\":367,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/\",\"name\":\"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg\",\"datePublished\":\"2020-03-26T07:00:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg\",\"width\":1302,\"height\":651},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/","og_locale":"en_US","og_type":"article","og_title":"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-03-26T07:00:11+00:00","og_image":[{"width":1302,"height":651,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker","datePublished":"2020-03-26T07:00:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/"},"wordCount":367,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/","url":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/","name":"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg","datePublished":"2020-03-26T07:00:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/03\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker.jpg","width":1302,"height":651},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/sans-is-offering-fully-certified-cybersecurity-training-without-leaving-your-bunker\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"SANS is offering fully certified cybersecurity training \u2013 without leaving your bunker"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34060"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34060\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34061"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}