{"id":38083,"date":"2020-11-08T22:00:12","date_gmt":"2020-11-08T22:00:12","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/"},"modified":"2020-11-08T22:00:12","modified_gmt":"2020-11-08T22:00:12","slug":"hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/","title":{"rendered":"Hackers work 24 hours a day \u2013 when will you schedule your security training?"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/09\/22\/shuttertock_hacker_money.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"reg_sticker secondary\">Promo<\/span> We might all be living under various degrees of lockdown, but that doesn\u2019t mean you can\u2019t sharpen up your security skills with some of the best instructors around \u2013 and all at early bird prices, if you\u2019re quick.<\/p>\n<p>That\u2019s because the <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/sans_cyber-security-training-events\" rel=\"noopener noreferrer\">SANS Institute<\/a> has announced new security training events for early 2021, which will get you up to speed on the latest security threats, thinking and techniques across a range of platforms and industries, and across a range of time zones.<\/p>\n<p>And best of all, you can enjoy early bird discounts across all three events, as well as the chance to gain valuable industry certifications off the back of your hard work.<\/p>\n<p>January 18 to 23 sees SANS hit Tokyo with a quartet of courses spanning Cloud Security and DevOps Automation, Windows Forensic Analysis, Advanced Network Forensics, and ISC\/SCADA Essentials, all delivered <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/sans_tokyo-january-2021\" rel=\"noopener noreferrer\">live online<\/a>.<\/p>\n<p>February sees the launch of <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/sans_south-by-southeast-asia-2021\" rel=\"noopener noreferrer\">South by Southeast Asia<\/a>, a virtual event running from Feb 1 to Feb 6, on Indian standard time. There are six courses, ranging from Hacker Tools, Techniques, Exploits and Incident Hunting, to Defeating Advanced Adversaries, all delivered online.<\/p>\n<p>And March sees no fewer than 16 courses delivered from <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/sans_secure-asia-pacific-2021\" rel=\"noopener noreferrer\">Singapore<\/a> at Secure Asia Pacific, from March 8 to 20. Sessions available range from Cloud Security Essentials and the Security Essential Bootcamp to Battlefield Forensics and Data Acquisition and Open Source Intelligence Data Gathering and Analysis. Attendees can join from anywhere, but local students will have the opportunity attend in-person live-stream training.<\/p>\n<p>Most of the courses are eligible for <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/giac_org\" rel=\"noopener noreferrer\">GIAC certifications<\/a>, and if you sign up for certification at the same time as you book your course, you\u2019ll save even more.<\/p>\n<p>While the topics and timings might be different, all these events share common SANS DNA.<\/p>\n<p>So you can be sure the content is always cutting edge, with world class instructors leading interactive sessions which mix the latest theory and thinking with practical, hands on lab exercises.<\/p>\n<p>You\u2019ll also get the chance to network with fellow students via chat channels, as well as access to the course content for four months after the live sessions end. And all three of these events include Virtual NetWars tournaments, so you can put your new skills to work against your new friends.<\/p>\n<p>So, whether your interest is in the security bootcamp sessions, you want to get deep on incident response, expand your wireless penetration testing skills, or automate information security using Python, book now. It won\u2019t just secure your spot \u2013 it\u2019ll secure those earlybird discounts.<\/p>\n<p> <i>Paid for by the SANS Institute.<\/i>\n<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/11\/08\/sans_training_in_se_asia\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s SANS training time in Tokyo, Singapore, and India Promo\u00a0 We might all be living under various degrees of lockdown, but that doesn\u2019t mean you can\u2019t sharpen up your security skills with some of the best instructors around \u2013 and all at early bird prices, if you\u2019re quick.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38084,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers work 24 hours a day \u2013 when will you schedule your security training? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers work 24 hours a day \u2013 when will you schedule your security training? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-08T22:00:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Hackers work 24 hours a day \u2013 when will you schedule your security training?\",\"datePublished\":\"2020-11-08T22:00:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/\"},\"wordCount\":441,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/\",\"name\":\"Hackers work 24 hours a day \u2013 when will you schedule your security training? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg\",\"datePublished\":\"2020-11-08T22:00:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg\",\"width\":750,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers work 24 hours a day \u2013 when will you schedule your security training?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers work 24 hours a day \u2013 when will you schedule your security training? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/","og_locale":"en_US","og_type":"article","og_title":"Hackers work 24 hours a day \u2013 when will you schedule your security training? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-08T22:00:12+00:00","og_image":[{"width":750,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Hackers work 24 hours a day \u2013 when will you schedule your security training?","datePublished":"2020-11-08T22:00:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/"},"wordCount":441,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/","url":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/","name":"Hackers work 24 hours a day \u2013 when will you schedule your security training? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg","datePublished":"2020-11-08T22:00:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training.jpg","width":750,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/hackers-work-24-hours-a-day-when-will-you-schedule-your-security-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers work 24 hours a day \u2013 when will you schedule your security training?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38083"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38083\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38084"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}