{"id":34926,"date":"2020-05-12T04:10:22","date_gmt":"2020-05-12T04:10:22","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/"},"modified":"2020-05-12T04:10:22","modified_gmt":"2020-05-12T04:10:22","slug":"india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/","title":{"rendered":"India releases data-use protocols for its contact-tracing app&#8230; after five weeks and 100 million downloads"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/05\/06\/aarogya_setyu_shutterstock_editorial_only.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>India&#8217;s government has released the protocol for using data gathered by its Aarogya Setu COVID-19 tracing app, weeks after its April 2nd release and after it was downloaded almost 100 million times.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.medianama.com\/wp-content\/uploads\/Aarogya_Setu_data-access-and-knowledge-sharing-Protocol.pdf\">The protocols<\/a> [PDF], released yesterday by India&#8217;s Ministry of Electronics and Information Technology (Meity), state that the state-run National Informatics Centre (NIC) will &#8220;collect only such data as is necessary and proportionate to formulate or implement appropriate health responses.&#8221;<\/p>\n<p>Data collected includes the user&#8217;s name, mobile number, age, gender, and profession, as well as which users they have been in contact with, for how long, and where they were.<\/p>\n<p>Contact, location, and self-assessment data collected by the app will by default remain on the individual user&#8217;s device, but &#8220;may be&#8221; uploaded on to an NIC server, where it will be kept for a maximum of 180 days. The user&#8217;s personal data can be kept for as long as the app is used, but users can request it be deleted within 30 days.<\/p>\n<p>The government will share the data from the app in an anonymised form with other government agencies &#8220;with whom such sharing is necessary to assist in the formulation or implementation of a critical health response&#8221;. The government will also share the data with local universities and research institutions to conduct research.<\/p>\n<p>The protocol also says that the data collected through the app can be shared with third parties in cases where \u201cit is strictly necessary to directly formulate or implement appropriate health responses&#8221;.<\/p>\n<p>The guidelines come amid increased concerns about how the data collected by the app will be used. Last week, the Ministry of Home Affairs made downloading the app mandatory for employees returning to offices. Critics have argued that&#8217;s illegal while opposition parties have called for greater transparency on the app&#8217;s operations.<\/p>\n<blockquote class=\"twitter-tweet\" readability=\"6.7415384615385\">\n<p lang=\"en\" dir=\"ltr\">Aarogya Setu has 98.5 million downloads. Bluetooth &amp; location data of only COVID19 positive are pushed to the server. Currently data of only 13287 COVID19 positive users has been uploaded to server to identify the Bluetooth contacts &amp; alert them. This is just 0.013% of all users.<\/p>\n<p>\u2014 Aarogya Setu (@SetuAarogya) <a href=\"https:\/\/twitter.com\/SetuAarogya\/status\/1259907714211147776?ref_src=twsrc%5Etfw\">May 11, 2020<\/a><\/p><\/blockquote>\n<p>The Indian government is also considering making the app mandatory for all airline passengers. Commercial flights have been suspended for the country&#8217;s three-month long lockdown period that began on March 25. The third-phase of the lockdown is due to end on Sunday, but the government has not said whether it plans to resume flights.<\/p>\n<p>India&#8217;s railways have, however, resumed limited operations. Tickets were sold only online and the website offering them promptly crashed under the load.<\/p>\n<p>As of yesterday, the app has warned 140,000 people about possible risks of infection, the government said, and identified 616 &#8220;potential hotspots.<\/p>\n<p>India&#8217;s government has in recent days increased messaging that the app is secure, non-intrusive and an essential tool for the nation during the pandemic. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1916\/-8373\/practical-tips-for-office-365-tenant-to-tenant-migration?td=wptl1916\">Practical tips for Office 365 tenant-to-tenant migration<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/05\/12\/aarogya_setu_data_use_guidelines\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cart, meet horse, and you can both worry about 180-day data retention India&#8217;s government has released the protocol for using data gathered by its Aarogya Setu COVID-19 tracing app, weeks after its April 2nd release and after it was downloaded almost 100 million times.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34927,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-34926","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>India releases data-use protocols for its contact-tracing app... after five weeks and 100 million downloads 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"India releases data-use protocols for its contact-tracing app... after five weeks and 100 million downloads 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-12T04:10:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"India releases data-use protocols for its contact-tracing app&#8230; after five weeks and 100 million downloads\",\"datePublished\":\"2020-05-12T04:10:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/\"},\"wordCount\":496,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/\",\"name\":\"India releases data-use protocols for its contact-tracing app... after five weeks and 100 million downloads 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg\",\"datePublished\":\"2020-05-12T04:10:22+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"India releases data-use protocols for its contact-tracing app&#8230; after five weeks and 100 million downloads\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"India releases data-use protocols for its contact-tracing app... after five weeks and 100 million downloads 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/","og_locale":"en_US","og_type":"article","og_title":"India releases data-use protocols for its contact-tracing app... after five weeks and 100 million downloads 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-12T04:10:22+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"India releases data-use protocols for its contact-tracing app&#8230; after five weeks and 100 million downloads","datePublished":"2020-05-12T04:10:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/"},"wordCount":496,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/","url":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/","name":"India releases data-use protocols for its contact-tracing app... after five weeks and 100 million downloads 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg","datePublished":"2020-05-12T04:10:22+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads.jpg","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/india-releases-data-use-protocols-for-its-contact-tracing-app-after-five-weeks-and-100-million-downloads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"India releases data-use protocols for its contact-tracing app&#8230; after five weeks and 100 million downloads"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34926"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34926\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34927"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34926"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}