{"id":35396,"date":"2020-06-08T02:00:08","date_gmt":"2020-06-08T02:00:08","guid":{"rendered":"http:\/\/0971f9d9-edec-46ec-8657-22ae774a382c"},"modified":"2020-06-08T02:00:08","modified_gmt":"2020-06-08T02:00:08","slug":"apac-employees-not-fully-secure-to-work-from-home","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/","title":{"rendered":"APAC employees not fully secure to work from home"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2014\/10\/02\/c377ad22-4a09-11e4-b6a0-d4ae52e95e57\/thumbnail\/770x578\/b9a7ed5045f714b5dbeec7c2f1920334\/40154725-1-security-keyboard-hand-hover-hacker-610.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>More employees are working from home amidst the global pandemic, but a majority do so without proper training on how to ensure they can keep their organisation safe. More than half are using their personal devices to carry out work tasks, even as they believe these devices are not fully secure against advanced security threats.&nbsp;<\/p>\n<p>And this despite 54% of these employees believing their organisations are more likely to experience a serious cyberattack during the COVID-19 pandemic than they would before the outbreak, according to findings from CrowdStrike&#8217;s 2020 Work Security Index. Conducted by YouGov, the online study polled 4,048 senior decision makers globally including 1,780 from four Asia-Pacific markets: 252 from Singapore, 526 in India, 502 from Japan, and 500 in Australia.&nbsp;<\/p>\n<p>The report confirmed that 59% of respondents across this region now were <a href=\"https:\/\/www.zdnet.com\/article\/opportune-time-for-apac-firms-to-assess-support-for-remote-workplace\/\" target=\"_blank\" rel=\"noopener noreferrer\">working remotely<\/a> more often than they did before due to the pandemic, with 74% in Singapore and 69% in India doing so.&nbsp;<\/p>\n<p>Some 62% across the four markets were using their personal devices, including mobile devices and laptops, to carry out work tasks whilst working remotely, while 86% did so with a mix of both company-issued and personal devices. Some 70% in Singapore and 72% in India were using their personal devices to perform work duties, while 62% in Australia and a lower 47% in Japan did likewise.&nbsp;<\/p>\n<p>And these employees did so whilst believing their devices were not fully secure against advanced cyber risks. Some 65% in Japan perceived their devices to be &#8220;somewhat secure&#8221; but 16% said devices they used to work from home were &#8220;not very secure&#8221; or &#8220;not secure at all&#8221;.&nbsp;<\/p>\n<p>Some 54% of their Australian counterparts felt these devices were &#8220;somewhat secure&#8221;, while 7% believed they were &#8220;not very secure&#8221; or &#8220;not secure at all&#8221;.&nbsp;<\/p>\n<p>In Singapore, 12% said devices they used to work from home were not very secure or not at all secured, while 56% described these as somewhat secure against advanced cyber threats.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>In comparison, Indian employees were an optimistic lot, with 58% believing the devices they used to work from home to be &#8220;very secure&#8221; against advanced cyber risks. They would need to hold on to this belief since 61% felt their organisations were more likely to experience a serious cyber attack during the COVID-19 pandemic than they did before the outbreak.&nbsp;<\/p>\n<p>This figure was the highest amongst the four Asia-Pacific markets, where 57% in Japan, 49% in Singapore, and 47% in Australia believed their company would likely come under a serious cyber attack during the pandemic. These numbers also were higher than the 41% in the US and 32% in the UK.&nbsp;<\/p>\n<p>However, across Asia-Pacific, 45% said their organisation did not provide employees with additional training on dealing with cybersecurity risks associated with working from home. Some 60% in Japan said they did not receive extra training, while 48% in Australia, 40% in Singapore, and 36% in India said likewise.&nbsp;<\/p>\n<p>CrowdStrike&#8217;s Asia-Pacific Japan vice president of engineering Sherif El Nabawi said: &#8220;With telecommuting still highly encouraged despite the easing of various countries&#8217; lockdown measures, unresolved cybersecurity risks from the initial shift to remote work will be carried forward and continue to present more opportunities for cyber adversaries.&#8221;<\/p>\n<p>He noted that employees who tapped their own devices to conduct work tasks brought increased risks, as compromised personal devices could jeopardise their company&#8217;s network. &#8220;These include employees inadvertently introducing malicious code when they move work-related files and documents between personal and corporate devices and networks,&#8221; Nabawi said. &#8220;Personal or home internet connections are also more vulnerable to threat activity, making remote workers a potential threat to sensitive company information.&#8221;<\/p>\n<p>&#8220;Organisations must, therefore, update their cybersecurity policies to factor in remote working. This includes planning for the use of personal devices, secure access for BYOD (Bring-Your-Own-Device) on corporate networks, and leveraging VPNs (virtual private networks) to protect sensitive data accessed through insecure Wi-Fi.&#8221;<\/p>\n<p>He urged companies to minimise their exposure by ensuring their <a href=\"https:\/\/www.zdnet.com\/article\/apac-firms-see-clueless-employees-as-biggest-security-threat\/\" target=\"_blank\" rel=\"noopener noreferrer\">employees were aware of cyber threats<\/a> associated with remote work and the importance of maintaining their cyber hygiene. He added that organisations should be prepared with crisis management and incident response plans that could be quickly executed, remotely.&nbsp;<\/p>\n<h3>RELATED COVERAGE<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/apac-employees-not-fully-secure-to-work-from-home\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than half of employees across four Asia-Pacific markets are using their personal devices to perform work tasks while working from home, even as they believe these devices are not fully secure against advanced security threats.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35397,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-35396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APAC employees not fully secure to work from home 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APAC employees not fully secure to work from home 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-08T02:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/apac-employees-not-fully-secure-to-work-from-home.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"APAC employees not fully secure to work from home\",\"datePublished\":\"2020-06-08T02:00:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/\"},\"wordCount\":686,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/apac-employees-not-fully-secure-to-work-from-home.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/\",\"name\":\"APAC employees not fully secure to work from home 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/apac-employees-not-fully-secure-to-work-from-home.jpg\",\"datePublished\":\"2020-06-08T02:00:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/apac-employees-not-fully-secure-to-work-from-home.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/apac-employees-not-fully-secure-to-work-from-home.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apac-employees-not-fully-secure-to-work-from-home\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APAC employees not fully secure to work from home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APAC employees not fully secure to work from home 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/","og_locale":"en_US","og_type":"article","og_title":"APAC employees not fully secure to work from home 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-08T02:00:08+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/apac-employees-not-fully-secure-to-work-from-home.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"APAC employees not fully secure to work from home","datePublished":"2020-06-08T02:00:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/"},"wordCount":686,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/apac-employees-not-fully-secure-to-work-from-home.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/","url":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/","name":"APAC employees not fully secure to work from home 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/apac-employees-not-fully-secure-to-work-from-home.jpg","datePublished":"2020-06-08T02:00:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/apac-employees-not-fully-secure-to-work-from-home.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/apac-employees-not-fully-secure-to-work-from-home.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apac-employees-not-fully-secure-to-work-from-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"APAC employees not fully secure to work from home"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35396"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35396\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35397"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}