{"id":37210,"date":"2020-09-18T17:00:28","date_gmt":"2020-09-18T17:00:28","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31586\/FBI-Opens-China-Related-Counter-Intelligence-Case-Every-10-Hours.html"},"modified":"2020-09-18T17:00:28","modified_gmt":"2020-09-18T17:00:28","slug":"fbi-opens-china-related-counter-intelligence-case-every-10-hours","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/","title":{"rendered":"FBI Opens China-Related Counter Intelligence Case Every 10 Hours"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.scmagazine.com\/wp-content\/uploads\/sites\/2\/2020\/09\/Wray_Chris-scaled-e1600397625594.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<div class=\"wysiwyg\">\n<p>FBI Director Christopher Wray today offered the House Homeland Security Committee some sobering news about China: the FBI opens a new China-related counterintelligence case roughly every 10 hours.<\/p>\n<p>Wray said of the nearly 5,000 active FBI counterintelligence cases underway across the U.S., almost half are related to China. He said China aims to compromise American health care organizations, pharmaceutical companies and academic institutions conducing important COVID-19 research.<\/p>\n<p>\u201cThey are going after cost and pricing information, internal strategy documents, personally identifiable information \u2013 anything that can give them a competitive advantage,\u201d Wray told House members this morning.<\/p>\n<p>Wray also said the FBI has become worried about a \u201cwider-than-ever\u201d range of threat actors \u2013 from multinational cyber syndicates to nation-state adversaries. And they are concerned that these threat actors are targeting managed service providers (MSPs) as a way of attacking multiple victims by hacking just one provider.<\/p>\n<p>The FBI Director added that China\u2019s Ministry of State Security (MSS) pioneered the MSP attack technique and said in July the FBI indicted two <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/justice-charges-chinese-nationals-in-hacking-campaign\/\">Chinese hackers<\/a> who worked with the Guangdong State Security Department of the MSS.<\/p>\n<p>The Chinese hackers conducted a hacking campaign that lasted more than 10 years, targeting countries with high technology industries. The sectors they hit included solar energy, pharmaceuticals and defense.&nbsp;<\/p>\n<p>\u201cCybercrimes like these, directed by the Chinese government\u2019s intelligence services, threaten not only the United States, but also every other country that supports fair play, international norms, and the rule of law, and they also seriously undermine China\u2019s desire to become a respected leader in world affairs,\u201d Wray said in his <a href=\"https:\/\/homeland.house.gov\/imo\/media\/doc\/Testimony%20-%20Wray.pdf\">written testimony.<\/a><\/p>\n<p>Kennan Skelly, CEO at shyftED, said there\u2019s really nothing new about the Chinese MSPs, adding that DHS has been picking up activity by Red Apollo (<a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/apts-cyberespionage\/report-chinese-cyberspies-hacked-msp-retailer-and-law-firm-in-economic-espionage-campaign\/\">Advanced Persistent Threat 10)<\/a> since 2014 with the Cloud Hopper campaign.&nbsp; &nbsp;<\/p>\n<p>\u201cMSPs are a rich target as they service many companies that fit into the 10 sectors of Chinese interest,\u201d Skelly said. <\/p>\n<p>Skelly said while MSPs aim to relieve the strain on organizations that cannot or do not want to manage their security in-house, they are equally at risk.&nbsp;For example, having dedicated teams and tools to protect customer organizations doesn\u2019t mean they can lock everything down at a customer.<\/p>\n<p>\u201cEven with the right security detection and mitigation in place it only takes one employee to click on a phishing or spear phishing email to allow threat actors in,\u201d Skelly said.&nbsp;\u201cRed Apollo has had great success using both of those tactics over many years.&nbsp;The most crucial defense we have is still the human line of defense, and sadly that still needs a lot of work.&nbsp; Until organizations begin to take security awareness seriously these threat actors will continue to prevail.\u201d<\/p>\n<p>Bob VanKirk, chief revenue officer at SonicWall, added that MSPs also need a single, centralized dashboard to more effectively manage customer networks.<\/p>\n<p>\u201cWith 62 percent of Americans still working remotely, many MSPs are challenged to manage multiple customer networks from afar,\u201d VanKirk said. \u201cThrough a single platform that tracks all its customers at once, MSPs can simplify operations and identify the new types of threat vectors to help their customers be proactive rather than reactive about a cyberattack.\u201d<\/p>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31586\/FBI-Opens-China-Related-Counter-Intelligence-Case-Every-10-Hours.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37211,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8937],"class_list":["post-37210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentusachinadata-losscyberwarfbi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FBI Opens China-Related Counter Intelligence Case Every 10 Hours 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FBI Opens China-Related Counter Intelligence Case Every 10 Hours 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-18T17:00:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2521\" \/>\n\t<meta property=\"og:image:height\" content=\"1510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"FBI Opens China-Related Counter Intelligence Case Every 10 Hours\",\"datePublished\":\"2020-09-18T17:00:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/\"},\"wordCount\":544,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg\",\"keywords\":[\"headline,hacker,government,usa,china,data loss,cyberwar,fbi\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/\",\"name\":\"FBI Opens China-Related Counter Intelligence Case Every 10 Hours 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg\",\"datePublished\":\"2020-09-18T17:00:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg\",\"width\":2521,\"height\":1510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,usa,china,data loss,cyberwar,fbi\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentusachinadata-losscyberwarfbi\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"FBI Opens China-Related Counter Intelligence Case Every 10 Hours\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FBI Opens China-Related Counter Intelligence Case Every 10 Hours 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/","og_locale":"en_US","og_type":"article","og_title":"FBI Opens China-Related Counter Intelligence Case Every 10 Hours 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-18T17:00:28+00:00","og_image":[{"width":2521,"height":1510,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"FBI Opens China-Related Counter Intelligence Case Every 10 Hours","datePublished":"2020-09-18T17:00:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/"},"wordCount":544,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg","keywords":["headline,hacker,government,usa,china,data loss,cyberwar,fbi"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/","url":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/","name":"FBI Opens China-Related Counter Intelligence Case Every 10 Hours 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg","datePublished":"2020-09-18T17:00:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/fbi-opens-china-related-counter-intelligence-case-every-10-hours.jpg","width":2521,"height":1510},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fbi-opens-china-related-counter-intelligence-case-every-10-hours\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,usa,china,data loss,cyberwar,fbi","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentusachinadata-losscyberwarfbi\/"},{"@type":"ListItem","position":3,"name":"FBI Opens China-Related Counter Intelligence Case Every 10 Hours"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37210"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37210\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37211"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}