{"id":38630,"date":"2020-12-10T19:00:50","date_gmt":"2020-12-10T19:00:50","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=92344"},"modified":"2020-12-10T19:00:50","modified_gmt":"2020-12-10T19:00:50","slug":"new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/","title":{"rendered":"New cloud-native breadth threat protection capabilities in Azure Defender"},"content":{"rendered":"<p>As the world adapts to working remotely, the threat landscape is constantly evolving, and security teams struggle to protect workloads with multiple solutions that are often not well integrated nor comprehensive enough. This results in serious threats avoiding detection, as well as security teams suffering from alert fatigue.<\/p>\n<p>Azure Defender helps security professionals with an integrated experience to meet your cloud workload protection needs spanning virtual machines, SQL, storage, containers, IoT, Azure network layer, Azure Key Vault, and more.<\/p>\n<p>Today we are excited to announce we are adding two new protections with the preview of Azure Defender for Resource Manager and Azure Defender for DNS, cloud-native breadth threat protection solutions. These new protections continue to improve your resiliency against attacks from bad actors and increase the number of Azure resources protected by Azure Defender significantly.<\/p>\n<h2>Azure Defender for Resource Manager<\/h2>\n<p><a href=\"https:\/\/azure.microsoft.com\/en-us\/features\/resource-manager\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Resource Manager<\/a> is the deployment and management service for Azure. It enables the creation and updating of all resources in your Azure account, with features, like access control, locks, and tags.<\/p>\n<p>The cloud management layer is a crucial service-connected to all your cloud resources. Because of this, it is also a potential target for attackers. Consequently, we recommend security operations teams monitor the Resource Manager layer closely.<\/p>\n<p>Azure Defender for Resource Manager will automatically monitor all resource management operations performed in your organization whether they are performed through the Azure portal, Azure REST APIs, Azure CLI, or other Azure programmatic clients. Defender runs advanced security analytics to detect threats and alert you when suspicious activity occurs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-92345 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/12\/azure-security.png\" alt=\"Azure Defender for Resource Manager monitors resource management operations to protect your Azure environment.\" width=\"1570\" height=\"756\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/12\/azure-security.png 1570w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/12\/azure-security-300x144.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/12\/azure-security-1024x493.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/12\/azure-security-768x370.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/12\/azure-security-1536x740.png 1536w\" sizes=\"auto, (max-width: 1570px) 100vw, 1570px\"><\/p>\n<p><em>Figure 1: Azure Defender for Resource Manager monitors resource management operations to protect your Azure environment.<\/em><\/p>\n<p>Azure Defender for Resource Manager protects against issues including:<\/p>\n<ul>\n<li>Suspicious resource management operations, such as operations from suspicious IP addresses, disabling antimalware and suspicious scripts running in virtual machine extensions.<\/li>\n<li>Use of exploitation toolkits like Microburst or PowerZure.<\/li>\n<li>Lateral movement from the Azure management layer to the Azure resources data plane.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/aka.ms\/DefenderForARM\" target=\"_blank\" rel=\"noopener noreferrer\">Learn more about Azure Defender for Resource Manager<\/a>.<\/p>\n<h2>Azure Defender for DNS<\/h2>\n<p>Azure Defender for DNS provides an additional layer of protection for your cloud resources by continuously monitoring all DNS queries from your Azure resources and runs advanced security analytics to alert you when suspicious activity is detected.<\/p>\n<p>Azure Defender for DNS protects against issues including:<\/p>\n<ul>\n<li>Data exfiltration from your Azure resources using DNS tunneling.<\/li>\n<li>Malware communicating with command and control server.<\/li>\n<li>Communication with malicious domains as phishing and crypto mining.<\/li>\n<li>DNS attacks\u2014communication with malicious DNS resolvers.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/aka.ms\/DefenderForDNS\" target=\"_blank\" rel=\"noopener noreferrer\">Learn more about Azure Defender for DNS<\/a>.<\/p>\n<h2>Get started for free today<\/h2>\n<p>Protect your entire Azure environment with a few clicks and enable Azure Defender for Resource Manager and Azure Defender for DNS. Both offerings are free during the preview period. <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/security-center-pricing#enable-azure-defender\" target=\"_blank\" rel=\"noopener noreferrer\">Turn Azure Defender on now.<\/a><\/p>\n<p>To learn more about Microsoft Security solutions and our Integrated Threat protection solution <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our&nbsp;website<\/a>. Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/12\/10\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the world adapts to working remotely, the threat landscape is constantly evolving, and security teams struggle to protect workloads with multiple solutions that are often not well integrated nor comprehensive enough. This results in serious threats avoiding detection, as well as security teams suffering from alert fatigue. Azure Defender helps security professionals with an&#8230;<br \/>\nThe post New cloud-native breadth threat protection capabilities in Azure Defender appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38631,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[5531,6426,347,1064],"class_list":["post-38630","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-azure-information-protection","tag-azure-security","tag-cybersecurity","tag-security-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New cloud-native breadth threat protection capabilities in Azure Defender 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New cloud-native breadth threat protection capabilities in Azure Defender 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-10T19:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1570\" \/>\n\t<meta property=\"og:image:height\" content=\"756\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"New cloud-native breadth threat protection capabilities in Azure Defender\",\"datePublished\":\"2020-12-10T19:00:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/\"},\"wordCount\":518,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png\",\"keywords\":[\"Azure Information Protection\",\"Azure Security\",\"Cybersecurity\",\"Security Intelligence\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/\",\"name\":\"New cloud-native breadth threat protection capabilities in Azure Defender 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png\",\"datePublished\":\"2020-12-10T19:00:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png\",\"width\":1570,\"height\":756},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Azure Information Protection\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/azure-information-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"New cloud-native breadth threat protection capabilities in Azure Defender\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New cloud-native breadth threat protection capabilities in Azure Defender 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/","og_locale":"en_US","og_type":"article","og_title":"New cloud-native breadth threat protection capabilities in Azure Defender 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-10T19:00:50+00:00","og_image":[{"width":1570,"height":756,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"New cloud-native breadth threat protection capabilities in Azure Defender","datePublished":"2020-12-10T19:00:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/"},"wordCount":518,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png","keywords":["Azure Information Protection","Azure Security","Cybersecurity","Security Intelligence"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/","url":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/","name":"New cloud-native breadth threat protection capabilities in Azure Defender 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png","datePublished":"2020-12-10T19:00:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender.png","width":1570,"height":756},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/new-cloud-native-breadth-threat-protection-capabilities-in-azure-defender\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Azure Information Protection","item":"https:\/\/www.threatshub.org\/blog\/tag\/azure-information-protection\/"},{"@type":"ListItem","position":3,"name":"New cloud-native breadth threat protection capabilities in Azure Defender"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38630"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38630\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38631"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}