{"id":38859,"date":"2020-12-23T16:49:58","date_gmt":"2020-12-23T16:49:58","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31876\/DHS-Warns-Against-Using-Chinese-Hardware-And-Digital-Services.html"},"modified":"2020-12-23T16:49:58","modified_gmt":"2020-12-23T16:49:58","slug":"dhs-warns-against-using-chinese-hardware-and-digital-services","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/","title":{"rendered":"DHS Warns Against Using Chinese Hardware And Digital Services"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/12\/23\/7d11e438-5dc7-46a6-aae4-63828014fe66\/made-in-china.jpg\" class alt=\"made-in-china.jpg\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"><a href=\"https:\/\/www.flickr.com\/photos\/twicepix\/4437851857\/in\/photolist-7La9Kc-2jeitPo-2hoeEPW-4yJk5X-6vYCo7-hp9f66-2iTYkW1-4DxXZC-2iSPAxf-2gcDKzC-2jiotHn-2j236Q2-aivfh5-2gMnY7v-9QGMqr-dhWGGw-2jAXyhM-2jipLps-dhWHpa-2gVgBDF-TaPf43-2icBwWj-npzHsC-2hha7ys-2ic2zKu-fyhnhx-2jbeoph-2k1XpG5-2jCr9no-eP53Wh-axnDgP-jw3M8R-2kc6L4h-2j1odpK-2jCrYXq-2j8EtzX-2g1M4KP-2jCYT4D-6sjstB-6sozvd-2jf55Zb-2iY1CPx-2j3GS8N-2ic7QoP-2hczLX3-2hQXojq-2hDzGNQ-24DP5wX-q59Rpk-6pCq6L\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">Image: Martin Abegglen (Flickr\/CC2.0)<\/a><\/span><\/figcaption><\/figure>\n<p>The US Department of Homeland Security has published a &#8220;business advisory&#8221; today warning US companies against using hardware equipment and digital services created or linked to Chinese companies.<\/p>\n<p>The DHS said that Chinese products could contain backdoors, bugdoors, or hidden data collection mechanisms that could be used by Chinese authorities to collect data from western companies and forward the information to local competitors to further China&#8217;s economic goals to the detriment of other countries.<\/p>\n<p>All equipment and services remotely linked to Chinese companies should be considered a cyber-security and business risk, the agency said.<\/p>\n<p>The DHS argues that Chinese national security laws allow the government to coerce any local company and citizen to alter products and engage in espionage or intellectual property theft.<\/p>\n<p>The DHS described this practice as &#8220;PRC [People&#8217;s Republic of China] government-sponsored data theft.&#8221;<\/p>\n<p>&#8220;For too long, US networks and data have been exposed to cyber threats based in China which are using that data to give Chinese firms an unfair competitive advantage in the global marketplace,&#8221; said Acting Secretary of Homeland Security Chad F. Wolf.<\/p>\n<p>&#8220;Practices that give the PRC government unauthorized access to sensitive data \u2013 both personal and proprietary \u2013 puts the US economy and businesses at direct risk for exploitation. We urge businesses to exercise caution before entering into any agreement with a PRC-linked firm.&#8221;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>In a&nbsp;<a href=\"https:\/\/www.dhs.gov\/news\/2020\/12\/21\/acting-secretary-chad-f-wolf-remarks-prepared-homeland-security-and-china-challenge\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">separate speech<\/a>&nbsp;on Monday, Wolf also described China as &#8220;a clear and present danger&#8221; to US democracy.<\/p>\n<p>The DHS published its advisory less than a month before a change in administration, with President Biden expected to name his own DHS chief next month.<\/p>\n<p>Under the Trump administration, US officials have focused on cracking down on Chinese theft from US companies.<\/p>\n<p>In a July 2020 interview with Fox News, FBI Director Christopher Wray said that&nbsp;<a href=\"https:\/\/www.foxnews.com\/politics\/fbi-director-wray-says-half-of-bureaus-5000-counterintelligence-cases-are-related-to-china\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">half of the FBI&#8217;s almost 5,000 counter-intelligence cases<\/a>&nbsp;were related to Chinese theft of US technology.<\/p>\n<p>Through its new advisory, the DHS warns US businesses that Chinese theft can sometimes occur not only through business partnerships and insider threats but also through backdoored equipment and digital services.<\/p>\n<p>&#8220;Any person or entity that chooses to procure data services and equipment from PRC-linked firms, or store data on software or equipment developed by such firms, should be aware of the economic, reputational, and, in certain instances, legal, risks associated with doing business with these firms,&#8221; the&nbsp;<a href=\"https:\/\/www.dhs.gov\/news\/2020\/12\/22\/dhs-warns-american-businesses-about-data-services-and-equipment-firms-linked-chinese\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">DHS said in a press release today<\/a>.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31876\/DHS-Warns-Against-Using-Chinese-Hardware-And-Digital-Services.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38860,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[4794],"class_list":["post-38859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusachinacyberwarbackdoor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DHS Warns Against Using Chinese Hardware And Digital Services 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DHS Warns Against Using Chinese Hardware And Digital Services 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-23T16:49:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"515\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"DHS Warns Against Using Chinese Hardware And Digital Services\",\"datePublished\":\"2020-12-23T16:49:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/\"},\"wordCount\":420,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg\",\"keywords\":[\"headline,government,usa,china,cyberwar,backdoor\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/\",\"name\":\"DHS Warns Against Using Chinese Hardware And Digital Services 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg\",\"datePublished\":\"2020-12-23T16:49:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg\",\"width\":1000,\"height\":515},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/dhs-warns-against-using-chinese-hardware-and-digital-services\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,china,cyberwar,backdoor\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusachinacyberwarbackdoor\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DHS Warns Against Using Chinese Hardware And Digital Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DHS Warns Against Using Chinese Hardware And Digital Services 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/","og_locale":"en_US","og_type":"article","og_title":"DHS Warns Against Using Chinese Hardware And Digital Services 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-23T16:49:58+00:00","og_image":[{"width":1000,"height":515,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"DHS Warns Against Using Chinese Hardware And Digital Services","datePublished":"2020-12-23T16:49:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/"},"wordCount":420,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg","keywords":["headline,government,usa,china,cyberwar,backdoor"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/","url":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/","name":"DHS Warns Against Using Chinese Hardware And Digital Services 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg","datePublished":"2020-12-23T16:49:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg","width":1000,"height":515},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/dhs-warns-against-using-chinese-hardware-and-digital-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,china,cyberwar,backdoor","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusachinacyberwarbackdoor\/"},{"@type":"ListItem","position":3,"name":"DHS Warns Against Using Chinese Hardware And Digital Services"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38859"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38859\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38860"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}