{"id":361,"date":"2018-05-09T17:00:15","date_gmt":"2018-05-09T17:00:15","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=131829"},"modified":"2018-05-09T17:00:15","modified_gmt":"2018-05-09T17:00:15","slug":"severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/","title":{"rendered":"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<div><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2015\/06\/07003611\/lg-phones.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>LG has patched two severe vulnerabilities that reside in the default keyboard on all mainstream LG smartphones, including its flagship handsets; the flaws could be used to remotely execute code with elevated privileges.<\/p>\n<p>LG\u2019s update also includes a fix for a critical Android issue, from Google.<\/p>\n<p>The first issue has to do with the fact that LG\u2019s keyboard supports handwriting modes in various languages. When a new language or an update for an existing one is installed, the device reaches out to a hardcoded server, from which it retrieves the requested language file or library. According to Check Point, which reported the flaws, the problem is that this download is done over an insecure HTTP connection, exposing it to man-in-the-middle attacks. A remote attacker could simply download a malicious file instead of the intended language file.<\/p>\n<p>The second problem is a validation flaw in LG\u2019s file system. The resource files within the LG keyboard package sandbox can be modified; and, LG\u2019s keyboard application grants executable permissions for any downloaded library file with the .so extension. Thus, an attacker that has gained MITM access via the first flaw can now inject a rogue executable file by simply appending the .so extension to a library download.<\/p>\n<p>Also, by altering the files.txt metadata file, the Engine.properties file can also be overwritten by a fake one.<\/p>\n<p>\u201cLG\u2019s keyboard loads the [library] indicated in Engine.properties configuration file on the application\u2019s startup, and the rogue lib we\u2019ve injected inside the aforementioned file would be loaded as soon as the keyboard process restarts,\u201d explained Check Point researcher Slava Makkaveev, in an <a href=\"https:\/\/research.checkpoint.com\/lg-keyboard-vulnerabilities\/\">analysis<\/a>. \u201cOnce we manage to inject the rouge lib inside Engine.properties, all we need to do is wait for the application to restart and load the library.\u201d<\/p>\n<p>The vulnerabilities, which LG treats as one flaw, are unique to LG devices. The threat surface is notable: The Korean giant\u2019s phones hold about a 16 percent\u00a0<a href=\"http:\/\/english.yonhapnews.co.kr\/news\/2018\/05\/04\/0200000000AEN20180504001800320.html\">market share<\/a> in the U.S., according to Strategy Analytics.<\/p>\n<p>The <a href=\"https:\/\/source.android.com\/security\/bulletin\/2018-05-01\">general Android flaw<\/a> meanwhile, which affects not only LG but other Android phones, is a critical vulnerability in Media framework that could enable a remote attacker to execute arbitrary code within the context of a privileged process, using a specially crafted file.<\/p>\n<p>LG released a <a href=\"https:\/\/lgsecurity.lge.com\/security_updates.html\">patch<\/a> for all of these in its May security update.<\/p>\n<p>Read More <a href=\"https:\/\/threatpost.com\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/131829\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An attacker can gain man-in-the-middle access to inject a rogue executable file onto the phone. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":362,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[162,241,242,243,29,116,244,245,19],"class_list":["post-361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-android","tag-handsets","tag-keyboard-flaw","tag-lg","tag-mobile-security","tag-patch","tag-remote-code-execution","tag-smartphone","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-09T17:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1568\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution\",\"datePublished\":\"2018-05-09T17:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/\"},\"wordCount\":408,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg\",\"keywords\":[\"Android\",\"handsets\",\"keyboard flaw\",\"LG\",\"Mobile Security\",\"patch\",\"remote code execution\",\"smartphone\",\"Vulnerabilities\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/\",\"name\":\"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg\",\"datePublished\":\"2018-05-09T17:00:15+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg\",\"width\":1568,\"height\":1600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/android\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/","og_locale":"en_US","og_type":"article","og_title":"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-09T17:00:15+00:00","og_image":[{"width":1568,"height":1600,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution","datePublished":"2018-05-09T17:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/"},"wordCount":408,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg","keywords":["Android","handsets","keyboard flaw","LG","Mobile Security","patch","remote code execution","smartphone","Vulnerabilities"],"articleSection":["Threatpost"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/","url":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/","name":"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg","datePublished":"2018-05-09T17:00:15+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution.jpg","width":1568,"height":1600},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/severe-keyboard-flaws-in-lg-smartphones-allow-remote-code-execution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Android","item":"https:\/\/www.threatshub.org\/blog\/tag\/android\/"},{"@type":"ListItem","position":3,"name":"Severe Keyboard Flaws in LG Smartphones Allow Remote Code Execution"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=361"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/361\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/362"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}