{"id":36228,"date":"2020-07-23T11:47:58","date_gmt":"2020-07-23T11:47:58","guid":{"rendered":"http:\/\/9c6c2c98-abf8-4b61-a053-5fde7d1bc653"},"modified":"2020-07-23T11:47:58","modified_gmt":"2020-07-23T11:47:58","slug":"sonicwall-report-covid-19-has-created-boon-for-criminals","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/","title":{"rendered":"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2020\/05\/28\/191605fb-face-477d-9325-39f6b328251a\/resize\/1200xauto\/0e5727ef6d4441cb7962130dcc4fbe8a\/istock-1206232102.jpg\" class alt=\"Father working from home and taking care of baby daughter\" height=\"auto\" width=\"1200\"><\/span><figcaption readability=\"1\"><span class=\"caption\" readability=\"2\"><\/p>\n<p>Working from home leaves staff open to security exploits.<\/p>\n<p><\/span><span class=\"credit\"> Getty Images\/iStockphoto <\/span><\/figcaption><\/figure>\n<p>Computer security firm <a href=\"https:\/\/www.sonicwall.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">SonicWall<\/a> says it has detected many COVID-19 related enterprise security threats and warns that criminals are increasingly taking advantage of insecure work from home setups. Its mid-year CyberSecurity Report 2020 found a big rise in exploits involving common workplace documents such as Microsoft Office.<\/p>\n<p>SonicWall has a global list of small to large business customers for which it handles a wide range of computer security tasks. It recently rewrote its security suite to outpace advances by hackers. Its global services means it monitors trillions of security attempts and intrusions, and spots trends in attacks. This data is compiled into semi-annual reports.<\/p>\n<p>Bill Conner, CEO of SonicWall, said the shift towards work from home that &#8220;we thought would take decades, [we saw] happen virtually overnight.&#8221; Companies scrambled to provide their workers with secure home connections but the criminals moved faster.<\/p>\n<p>&#8220;While the historic disruption accompanying the COVID-19 pandemic has been challenging for businesses, it&#8217;s been a boon for cybercriminals,&#8221; said Conner.<\/p>\n<p>Over the past year, hackers moved away from web browser exploits, partly because of better browser security, but also because there were easier opportunities in Microsoft Office document exploits in working from home environments. Malicious PDFs dropped by 8% but malicious Office documents jumped 176%.&nbsp;<\/p>\n<p>Another area seeing increased attention from hackers is Internet of Things (IoT) devices, with a 50% increase in intrusion attempts from a year ago. Again, it is the ease that attracts criminal attention. In one incident, a Las Vegas Casino enterprise IT system was penetrated by hackers via an Internet-connected thermometer in an aquarium.<\/p>\n<p>Overall, intrusion attempts rose 19% to 2.3 trillion over the past year. Ransomware attacks rose 20% to 121.4 million. Malware attacks dropped by one-third to 3.2 billion. And phishing was down 15% however, 7% of the volume was COVID-19 related.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Conner said that nation state hackers are increasingly using cybercriminal tactics to try and hide their activities. These include attempts to disrupt healthcare and access research data in other nations.&nbsp;<\/p>\n<p>SonicWall says that it discovered the first COVID-19 related exploit on February 4. It has now counted 20 COVID-19 related exploits in nearly every category, from malware to ransomware, Trojans, and more are expected.<\/p>\n<p>Chips are under attack. A troubling trend is new forms of malware that focus on weaknesses in chip hardware such as microprocessors.&nbsp;<\/p>\n<p>SonicWall says its machine learning technologies can detect attacks that have never been seen before, including encrypted attacks that do not exhibit outward malicious behavior.&nbsp;<\/p>\n<p>And criminal attacks are becoming more sophisticated. In recent weeks, SonicWall Capture Labs detected never before seen techniques to evade signature-based anti-malware systems, and new types of &#8220;nefarious&#8221; threats targeting common office documents.<\/p>\n<p>SonicWall says its security products can monitor and block attacks in real-time and detect and neutralize hundreds of thousands of malware variants \u2014 which increased 62% in the second half of 2019. Hackers will move onto easier targets.<\/p>\n<p>The SonicWall CyberSecurity report can be found <a href=\"https:\/\/www.sonicwall.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">here<\/a>.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/sonicwall-report-covid-19-has-created-boon-for-criminals\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers have adapted their strategies to take advantage of the pandemic and vulnerable work-from-home IT connections.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36229,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-36228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-23T11:47:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"856\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals\",\"datePublished\":\"2020-07-23T11:47:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/\"},\"wordCount\":504,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/\",\"name\":\"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg\",\"datePublished\":\"2020-07-23T11:47:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg\",\"width\":1200,\"height\":856},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sonicwall-report-covid-19-has-created-boon-for-criminals\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/","og_locale":"en_US","og_type":"article","og_title":"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-23T11:47:58+00:00","og_image":[{"width":1200,"height":856,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals","datePublished":"2020-07-23T11:47:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/"},"wordCount":504,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/","url":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/","name":"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg","datePublished":"2020-07-23T11:47:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/sonicwall-report-covid-19-has-created-boon-for-criminals.jpg","width":1200,"height":856},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/sonicwall-report-covid-19-has-created-boon-for-criminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"SonicWall report: COVID-19 has created \u2018boon\u2019 for criminals"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36228"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36228\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36229"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}