{"id":363,"date":"2018-05-09T16:08:20","date_gmt":"2018-05-09T16:08:20","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=131822"},"modified":"2018-05-09T16:08:20","modified_gmt":"2018-05-09T16:08:20","slug":"georgia-governor-vetoes-controversial-hack-back-bill","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/","title":{"rendered":"Georgia Governor Vetoes Controversial Hack-Back Bill"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<div><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/05\/09120731\/Georgia_Dome_Politics.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Recognizing the concerns of tech giants and security researchers alike, Georgia Gov. Nathan Deal has vetoed a controversial \u201chack-back\u201d bill that would have allowed companies in the state to perform offensive cyber-actions in the face of an attack.<\/p>\n<p>\u201cCertain components of the legislation have led to concerns regarding national security implications and other potential ramifications,\u201d Deal said in his <a href=\"https:\/\/gov.georgia.gov\/press-releases\/2018-05-08\/deal-issues-2018-veto-statements\">veto statement<\/a>. \u201cConsequently, while intending to protect against online breaches and hacks, S.B. 315 may inadvertently hinder the ability of government and private industries to do so. After careful review and consideration of this legislation, including feedback from other stakeholders, I have concluded more discussion is required before enacting this cybersecurity legislation.\u201d<\/p>\n<p>State Bill 315 <a href=\"https:\/\/threatpost.com\/hacktivists-tech-giants-protest-georgias-hack-back-bill\/131628\/\">would have allowed<\/a> \u201cactive defense measures that are designed to prevent or detect unauthorized computer access;\u201d and, sought to criminalize \u201cunauthorized computer access,\u201d stipulating that accessing an outside computer or network is only valid when done \u201cfor a legitimate business activity.\u201d<\/p>\n<p>Opponents questioned both aspects: Some argued whether legitimizing offensive attacks would open the door to a new kind of corporate warfare; others were concerned that the law would have a chilling effect on cyber-research by criminalizing white-hat activity, like vulnerability research and pen-testing.<\/p>\n<p>In a letter to the governor, Microsoft and Google argued that S.B. 315 \u201cwill make Georgia a laboratory for offensive cybersecurity practices that may have unintended consequences and that have not been authorized in other jurisdictions,\u201d and that \u201cprovisions such as this could easily lead to abuse and be deployed for anti-competitive, not protective purposes.\u201d<\/p>\n<p>Members of the security community meanwhile said that the criminalization of the vaguely worded \u201cunauthorized computer access\u201d could result in ethical-hacking researchers being fined or even sent to jail, as well as take the air out of bug-bounty programs.<\/p>\n<p dir=\"ltr\">\u201cWhen Georgia lawmakers initially passed S.B. 315 in April, the legislation had all the warning signs of a reactionary strategy spurred by the exposure of personal information of 6.7 million voters in July,\u201d said Sanjay Beri, CEO and co-founder at Netskope, via email. \u201cInstead of creating a law to proactively address the security shortcomings of state systems and infrastructure, lawmakers chose the stick over the carrot, and opted to simply create harsher penalties for \u2018unauthorized access.\u2019 The problem is their definition of what \u2018unauthorized\u2019 access looks like is ill defined, and fails to account for the work of well-intentioned cybersecurity researchers, such as bug bounty hunters.\u201d<\/p>\n<p dir=\"ltr\">While I\u2019m glad the bill was ultimately vetoed, the fact that it made it this far in the face of nearly unanimous criticism from the security industry should be a cautionary tale. If our lawmakers hope to move the needle for security, their efforts would be better spent on laws that also require organizations to bolster their defenses, as opposed to simply increasing penalties for a somewhat cavalier definition of attackers.\u201d<\/p>\n<p>According to the Electronic Frontier Foundation, which opposed the bill. Nearly 200 Georgia residents emailed the governor demanding a veto, while 55 computer professionals from around the country submitted a joint letter of opposition. Professors also organized at Georgia Tech to call upon the governor to veto the bill.<\/p>\n<p>\u201cGeorgia State Bill 315 had the entire cybersecurity community shaking its head in disbelief, so I\u2019m relieved the governor ultimately chose to veto the legislation, demonstrating that cybersecurity is important, and ensuring experts have the ability to help Georgia overcome its unique challenges is clearly is a priority,\u201d said Lisa Wiswell, policy advisor at bug-bounty platform HackerOne, via email. \u201cAs written, the bill was modeled after the highly-controversial <a href=\"https:\/\/threatpost.com\/active-defense-bill-raises-concerns-of-potential-consequences\/124112\/\">Computer Fraud and Abuse Act<\/a>, which makes accessing a network or computer without authorization illegal \u2013 even if there is no theft or damage. While many parts of the U.S. government are advancing cybersecurity by adopting industry\u2019s best practices, such as allowing security researchers to identify and disclose vulnerabilities that make us all safer, if they had passed the bill, Georgia would have been closing door to these folks. I\u2019m glad Georgia has rejected the stunting cybersecurity legislation of the past, and is open-minded to industry best practices.\u201d<\/p>\n<p> Read More <a href=\"https:\/\/threatpost.com\/georgia-governor-vetoes-controversial-hack-back-bill\/131822\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The bill would have allowed companies in the state to perform offensive cyberactions in the face of an attack. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":364,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[246,126,247,248,18,249,250],"class_list":["post-363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-georgia","tag-government","tag-governor-deal","tag-hack-back-bill","tag-hacks","tag-legislation","tag-veto"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Georgia Governor Vetoes Controversial Hack-Back Bill 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Georgia Governor Vetoes Controversial Hack-Back Bill 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-09T16:08:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/georgia-governor-vetoes-controversial-hack-back-bill.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"466\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Georgia Governor Vetoes Controversial Hack-Back Bill\",\"datePublished\":\"2018-05-09T16:08:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/\"},\"wordCount\":682,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/georgia-governor-vetoes-controversial-hack-back-bill.jpg\",\"keywords\":[\"Georgia\",\"Government\",\"governor deal\",\"hack back bill\",\"Hacks\",\"legislation\",\"veto\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/\",\"name\":\"Georgia Governor Vetoes Controversial Hack-Back Bill 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/georgia-governor-vetoes-controversial-hack-back-bill.jpg\",\"datePublished\":\"2018-05-09T16:08:20+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/georgia-governor-vetoes-controversial-hack-back-bill.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/georgia-governor-vetoes-controversial-hack-back-bill.jpg\",\"width\":700,\"height\":466},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/georgia-governor-vetoes-controversial-hack-back-bill\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Georgia\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/georgia\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Georgia Governor Vetoes Controversial Hack-Back Bill\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Georgia Governor Vetoes Controversial Hack-Back Bill 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/","og_locale":"en_US","og_type":"article","og_title":"Georgia Governor Vetoes Controversial Hack-Back Bill 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-09T16:08:20+00:00","og_image":[{"width":700,"height":466,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/georgia-governor-vetoes-controversial-hack-back-bill.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Georgia Governor Vetoes Controversial Hack-Back Bill","datePublished":"2018-05-09T16:08:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/"},"wordCount":682,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/georgia-governor-vetoes-controversial-hack-back-bill.jpg","keywords":["Georgia","Government","governor deal","hack back bill","Hacks","legislation","veto"],"articleSection":["Threatpost"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/","url":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/","name":"Georgia Governor Vetoes Controversial Hack-Back Bill 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/georgia-governor-vetoes-controversial-hack-back-bill.jpg","datePublished":"2018-05-09T16:08:20+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/georgia-governor-vetoes-controversial-hack-back-bill.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/georgia-governor-vetoes-controversial-hack-back-bill.jpg","width":700,"height":466},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/georgia-governor-vetoes-controversial-hack-back-bill\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Georgia","item":"https:\/\/www.threatshub.org\/blog\/tag\/georgia\/"},{"@type":"ListItem","position":3,"name":"Georgia Governor Vetoes Controversial Hack-Back Bill"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=363"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/363\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/364"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}